diff options
| author | 2025-11-08 22:59:23 +0800 | |
|---|---|---|
| committer | 2025-11-09 17:47:52 -0600 | |
| commit | 98a5fd31cbf72d46bf18e50b3ab0ce86d5f319a9 (patch) | |
| tree | 1317104aa262b5a084c62da667fdd1d11aaa74cd /drivers/acpi/cppc_acpi.c | |
| parent | smb: server: rdma: avoid unmapping posted recv on accept failure (diff) | |
| download | wireguard-linux-98a5fd31cbf72d46bf18e50b3ab0ce86d5f319a9.tar.xz wireguard-linux-98a5fd31cbf72d46bf18e50b3ab0ce86d5f319a9.zip | |
ksmbd: close accepted socket when per-IP limit rejects connection
When the per-IP connection limit is exceeded in ksmbd_kthread_fn(),
the code sets ret = -EAGAIN and continues the accept loop without
closing the just-accepted socket. That leaks one socket per rejected
attempt from a single IP and enables a trivial remote DoS.
Release client_sk before continuing.
This bug was found with ZeroPath.
Cc: stable@vger.kernel.org
Signed-off-by: Joshua Rogers <linux@joshua.hu>
Acked-by: Namjae Jeon <linkinjeon@kernel.org>
Signed-off-by: Steve French <stfrench@microsoft.com>
Diffstat (limited to 'drivers/acpi/cppc_acpi.c')
0 files changed, 0 insertions, 0 deletions
